Show plain JSON{"containers": {"cna": {"affected": [{"product": "Fibaro Home Center", "vendor": "Fibar Group S.A", "versions": [{"lessThanOrEqual": "4.600", "status": "affected", "version": "Home Center 2", "versionType": "custom"}, {"lessThanOrEqual": "4.600", "status": "affected", "version": "Home Center Lite", "versionType": "custom"}]}], "credits": [{"lang": "en", "value": "Marton Illes IoT Inspector Research Lab https://www.iot-inspector.com"}], "datePublic": "2021-04-15T00:00:00", "descriptions": [{"lang": "en", "value": "Fibaro Home Center 2 and Lite devices with firmware version 4.600 and older initiate SSH connections to the Fibaro cloud to provide remote access and remote support capabilities. This connection can be intercepted using DNS spoofing attack and a device initiated remote port-forward channel can be used to connect to the web management interface. Knowledge of authorization credentials to the management interface is required to perform any further actions."}], "metrics": [{"cvssV3_1": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1"}}], "problemTypes": [{"descriptions": [{"cweId": "CWE-295", "description": "CWE-295 Improper Certificate Validation", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"dateUpdated": "2022-09-30T09:15:16", "orgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "shortName": "CERTVDE"}, "references": [{"tags": ["x_refsource_CONFIRM"], "url": "https://www.iot-inspector.com/blog/advisory-fibaro-home-center/"}, {"name": "20210419 [CVE-2021-20989, CVE-2021-20990, CVE-2021-20991, CVE-2021-20992] Multiple vulnerabilities in Fibaro Home Center", "tags": ["mailing-list", "x_refsource_FULLDISC"], "url": "http://seclists.org/fulldisclosure/2021/Apr/27"}, {"tags": ["x_refsource_MISC"], "url": "http://packetstormsecurity.com/files/162243/Fibaro-Home-Center-MITM-Missing-Authentication-Code-Execution.html"}], "source": {"discovery": "EXTERNAL"}, "title": "Fibaro Home Center Insufficient remote access server authorization", "x_generator": {"engine": "Vulnogram 0.0.9"}, "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "info@cert.vde.com", "DATE_PUBLIC": "2021-04-15T10:00:00.000Z", "ID": "CVE-2021-20989", "STATE": "PUBLIC", "TITLE": "Fibaro Home Center Insufficient remote access server authorization"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "Fibaro Home Center", "version": {"version_data": [{"version_affected": "<=", "version_name": "Home Center 2", "version_value": "4.600"}, {"version_affected": "<=", "version_name": "Home Center Lite", "version_value": "4.600"}]}}]}, "vendor_name": "Fibar Group S.A"}]}}, "credit": [{"lang": "eng", "value": "Marton Illes IoT Inspector Research Lab https://www.iot-inspector.com"}], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "Fibaro Home Center 2 and Lite devices with firmware version 4.600 and older initiate SSH connections to the Fibaro cloud to provide remote access and remote support capabilities. This connection can be intercepted using DNS spoofing attack and a device initiated remote port-forward channel can be used to connect to the web management interface. Knowledge of authorization credentials to the management interface is required to perform any further actions."}]}, "generator": {"engine": "Vulnogram 0.0.9"}, "impact": {"cvss": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-295 Improper Certificate Validation"}]}]}, "references": {"reference_data": [{"name": "https://www.iot-inspector.com/blog/advisory-fibaro-home-center/", "refsource": "CONFIRM", "url": "https://www.iot-inspector.com/blog/advisory-fibaro-home-center/"}, {"name": "20210419 [CVE-2021-20989, CVE-2021-20990, CVE-2021-20991, CVE-2021-20992] Multiple vulnerabilities in Fibaro Home Center", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2021/Apr/27"}, {"name": "http://packetstormsecurity.com/files/162243/Fibaro-Home-Center-MITM-Missing-Authentication-Code-Execution.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/162243/Fibaro-Home-Center-MITM-Missing-Authentication-Code-Execution.html"}]}, "source": {"discovery": "EXTERNAL"}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-03T17:53:23.084Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://www.iot-inspector.com/blog/advisory-fibaro-home-center/"}, {"name": "20210419 [CVE-2021-20989, CVE-2021-20990, CVE-2021-20991, CVE-2021-20992] Multiple vulnerabilities in Fibaro Home Center", "tags": ["mailing-list", "x_refsource_FULLDISC", "x_transferred"], "url": "http://seclists.org/fulldisclosure/2021/Apr/27"}, {"tags": ["x_refsource_MISC", "x_transferred"], "url": "http://packetstormsecurity.com/files/162243/Fibaro-Home-Center-MITM-Missing-Authentication-Code-Execution.html"}]}]}, "cveMetadata": {"assignerOrgId": "270ccfa6-a436-4e77-922e-914ec3a9685c", "assignerShortName": "CERTVDE", "cveId": "CVE-2021-20989", "datePublished": "2021-04-19T14:05:02.362822Z", "dateReserved": "2020-12-17T00:00:00", "dateUpdated": "2024-09-17T00:42:24.901Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}